2014 ieee java network security project security games for node localization through verifiable...

6
Security Games for Node Localization through Verifiable Multilateration ABSTRACT: Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are notnecessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNscould be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers.Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS| IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsem[email protected]

Upload: ieeebebtechstudentsprojects

Post on 21-Jun-2015

193 views

Category:

Engineering


6 download

DESCRIPTION

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - [email protected] Our Website: www.finalyearprojects.org

TRANSCRIPT

Page 1: 2014 IEEE JAVA NETWORK SECURITY PROJECT Security games for node localization through verifiable multilateration

Security Games for Node Localization through Verifiable

Multilateration

ABSTRACT:

Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor

nodes, which are notnecessarily known beforehand. Several localization approaches have been

proposed but most of them omit to consider that WSNscould be deployed in adversarial settings,

where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable

multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted

landmark nodes that act as verifiers.Although VM is able to recognize reliable localization

measures, it allows for regions of undecided positions that can amount to the40 percent of the

monitored area. We studied the properties of VM as a noncooperative two-player game where

the first playeremploys a number of verifiers to do VM computations and the second player

controls a malicious node. The verifiers aim at securelylocalizing malicious nodes, while

malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to

gametheory, the potentialities of VM are analyzed with the aim of improving the defender’s

strategy. We found that the best placement forverifiers is an equilateral triangle with edge equal

to the power range R, and maximum deception in the undecided region isapproximately 0:27R.

Moreover, we characterized—in terms of the probability of choosing an unknown node to

examine further—thestrategies of the players.

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

Page 2: 2014 IEEE JAVA NETWORK SECURITY PROJECT Security games for node localization through verifiable multilateration

EXISTING SYSTEM:

At first, we study how the strategy of the malicious nodeat the equilibrium changes as

discretization grain jSjchanges and as the number of nonmalicious nodes changes.We searched

for a Nash equilibrium with jSj 2 ½10; 50 and a

step of 2 applied to the experimental setting described inthe previous section. Given that multiple

Nash equilibriacan coexist in a single game, each with different properties,we searched a specific

Nash equilibrium to have aconsistent comparison of the strategies. More precisely,we searched

for the Nash equilibrium minimizing theexpected utility of the malicious node by solving

themathematical programming problems described in Section5.2.2 with the objective function

min um. The basic model to prevent DoS attacks is a two-playergeneral-sum noncooperative

game between the attackernode and the WSNs . Given a fixed node i, theattacker’s available

actions are: attack sensor node i doesnot attack at all, or attack a different actor sensor

node;while the WSNs’ available actions are two: defend sensornode i, or defend a different

sensor node.

PROPOSED SYSTEM:

Verifiablemultilateration (VM) was proposed to cope with this proThus, several localization

schemes have been proposedbut most of thecurrent approaches omit to consider that WSNs

could bedeployed in adversarial settings, where hostile nodes underthe control of an attacker

coexist with faithful ones. Wirelesscommunications are easy to tamper, and nodes are prone

tophysical attacks and cloning; thus, classical solutions, basedon access control and strong

authentication, are difficult todeploy due to limited power resources of nodes. this direction, a

Page 3: 2014 IEEE JAVA NETWORK SECURITY PROJECT Security games for node localization through verifiable multilateration

well-defined approach to localize nodeseven when some of them are compromised was proposed

inand it is known as verifiable multilateration (VM).

CONCLUSION:

In this paper, we studied a novel game theoretical scenariofor WSNs where verifiable

multilateration is employed toassess the presence of malicious nodes. We built a gametheoretical

framework where verifiers and malicious nodescompete one against each other as rational

players. First, westudied the best placement of the verifiers to minimizethe maximum deception

of the malicious node and wederived the equilibrium prescribing the optimal strategy forthe

verifiers and for the malicious node. We studied the casewith three verifiers and subsequently we

extended the resultto an arbitrary number of verifiers showing how, as thisnumber increases, the

maximum deception of the maliciousnode decreases. Second, we studied how the malicious

nodechanges its strategy when a number of nonmalicious nodesare present. We did this by

considering the best strategy forthe malicious node when verifiers can inspect one node. To find

the equilibrium, we provided a mixed-integer-linear programming formulation and we

experimentally showed that the Nash equilibria of the game almost everywhere coincide with the

malicious node’s maxminstrategyWe also aim at extending our framework to handle multiple

malicious nodes, additional security countermeasures, and energy constraints.

Page 4: 2014 IEEE JAVA NETWORK SECURITY PROJECT Security games for node localization through verifiable multilateration

SYSTEM CONFIGURATION:-

HARDWARE CONFIGURATION:-

Processor - Pentium –IV

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

SOFTWARE CONFIGURATION:-

Operating System : Windows XP

Programming Language : JAVA

Java Version : JDK 1.6 & above.